β Snake alert! This ransomware is not a gameβ¦ β
π Read
via "Naked Security".
Looks like the Snake ransomware was created especially for network-wide attacks.π Read
via "Naked Security".
Naked Security
Snake alert! This ransomware is not a gameβ¦
Looks like the Snake ransomware was created especially for network-wide attacks.
β Powerful GPG collision attack spells the end for SHA-1 β
π Read
via "Naked Security".
New research has heightened an already urgent call to abandon SHA-1, a cryptographic algorithm still used in many popular online services.π Read
via "Naked Security".
Naked Security
Powerful GPG collision attack spells the end for SHA-1
New research has heightened an already urgent call to abandon SHA-1, a cryptographic algorithm still used in many popular online services.
π CES 2020: Biggest tech trends spotted for business pros π
π Read
via "Security on TechRepublic".
From analytics and AI to 5G and Wi-Fi 6, here's all the enterprise tech that took center stage at CES 2020.π Read
via "Security on TechRepublic".
TechRepublic
CES 2020: Biggest tech trends spotted for business pros
From analytics and AI to 5G and Wi-Fi 6, here's all the enterprise tech that took center stage at CES 2020.
π΄ Will This Be the Year of the Branded Cybercriminal? π΄
π Read
via "Dark Reading: ".
Threat actors will continue to grow enterprise-style businesses that evolve just like their legitimate counterparts.π Read
via "Dark Reading: ".
Darkreading
Will This Be the Year of the Branded Cybercriminal?
Threat actors will continue to grow enterprise-style businesses that evolve just like their legitimate counterparts.
β Unpatched Citrix Flaw Now Has PoC Exploits β
π Read
via "Threatpost".
Over 25,000 servers globally are vulnerable to the critical Citrix remote code execution vulnerability.π Read
via "Threatpost".
Threat Post
Unpatched Citrix Flaw Now Has PoC Exploits
Over 25,000 servers globally are vulnerable to the critical Citrix remote code execution vulnerability.
β βCable Hauntβ Bug Plagues Millions of Home Modems β
π Read
via "Threatpost".
The issue lies in underlying reference software used by multiple cable-modem manufacturers to create device firmware.π Read
via "Threatpost".
Threat Post
βCable Hauntβ Bug Plagues Millions of Home Modems
The issue lies in underlying reference software used by multiple cable-modem manufacturers to create device firmware.
ATENTIONβΌ New - CVE-2011-2670
π Read
via "National Vulnerability Database".
Mozilla Firefox before 3.6 is vulnerable to XSS via the rendering of Cascading Style Sheetsπ Read
via "National Vulnerability Database".
π΄ Texas School District Loses $2.3M to Phishing Attack π΄
π Read
via "Dark Reading: ".
The Manor Independent School District is investigating a phishing email scam that led to three separate fraudulent transactions.π Read
via "Dark Reading: ".
Dark Reading
Texas School District Loses $2.3M to Phishing Attack
The Manor Independent School District is investigating a phishing email scam that led to three separate fraudulent transactions.
π΄ An Identity Management Spin on Shaggy's Hit Song π΄
π Read
via "Dark Reading: ".
Wondering how this guy could be so clumsy? So is he.π Read
via "Dark Reading: ".
Dark Reading
An Identity Management Spin on Shaggy's Hit Song
Wondering how this guy could be so clumsy? So is he.
π CES 2020: Why HBO wants us to think twice about data privacy π
π Read
via "Security on TechRepublic".
A Westworld-themed experience gave attendees a creepy glimpse into tech consequences of the future.π Read
via "Security on TechRepublic".
TechRepublic
CES 2020: Why HBO wants us to think twice about data privacy
A Westworld-themed experience gave attendees a creepy glimpse into tech consequences of the future.
π Virginia Introduces Privacy Law Of Its Own π
π Read
via "Subscriber Blog RSS Feed ".
Virginia appears to be following in the footsteps of California with a new legislation, the Virginia Privacy Act, that would strengthen the data privacy rights of Virginians.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Virginia Introduces Privacy Law Of Its Own
Virginia appears to be following in the footsteps of California with new legislation, the Virginia Privacy Act, that would strengthen the data privacy rights of Virginians.
β CES Surveillance Hype Worries Privacy Advocates β
π Read
via "Threatpost".
CES wiz-bang surveillance tech gives privacy advocates the willies.π Read
via "Threatpost".
Threat Post
CES Surveillance Hype Worries Privacy Advocates
CES wiz-bang surveillance tech gives privacy advocates the willies.
π December's Most Wanted Malware: Greta Thunberg-themed spam used to spread Emotet π
π Read
via "Security on TechRepublic".
Check Point's December 2019 Index finds Emotet as lead malware for the third month in a row, spreading email spam, some which alleged support of the teen activist.π Read
via "Security on TechRepublic".
TechRepublic
December's Most Wanted Malware: Greta Thunberg-themed spam used to spread Emotet
Check Point's December 2019 Index finds Emotet as lead malware for the third month in a row, spreading email spam, some which alleged support of the teen activist.
β Joker Android Malware Snowballs on Google Play β
π Read
via "Threatpost".
Google has removed 17,000 Joker-infested apps from the Play store to date.π Read
via "Threatpost".
Threat Post
Joker Android Malware Snowballs on Google Play
Google has removed 17,000 Joker-infested apps from the Play store to date.
β Scammers Dupe Texas School District Out of $2.3M β
π Read
via "Threatpost".
The wide-scale phishing scam reportedly started in early November and continued through December, before it was discovered by the Texas school district.π Read
via "Threatpost".
Threat Post
Scammers Dupe Texas School District Out of $2.3M
The wide-scale phishing scam reportedly started in early November and continued through December, before it was discovered by the Texas school district.
π΄ Microsoft to Officially End Support for Windows 7, Server 2008 π΄
π Read
via "Dark Reading: ".
Windows 7 and Server 2008 will continue to work after Jan. 14, 2020, but will no longer receive security updates.π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
π΄ What Questions Should I Keep in Mind to Improve My Security Metrics? π΄
π Read
via "Dark Reading: ".
If you can answer these six questions, you'll be off to a great start.π Read
via "Dark Reading: ".
Dark Reading
What Questions Should I Keep in Mind to Improve My Security Metrics?
If you can answer these six questions, you'll be off to a great start.
π΄ Exploits Released for As-Yet Unpatched Critical Citrix Flaw π΄
π Read
via "Dark Reading: ".
Organizations need to apply mitigations for vulnerability in Citrix Application Delivery Controller and Citrix Gateway ASAP, security researchers say.π Read
via "Dark Reading: ".
Dark Reading
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Organizations need to apply mitigations for vulnerability in Citrix Application Delivery Controller and Citrix Gateway ASAP, security researchers say.
π΄ Website Collecting Australian Fire Donations Hit by Magecart π΄
π Read
via "Dark Reading: ".
The attack may have compromised donors' payment information.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π What to do if you're still running Windows 7 π
π Read
via "Security on TechRepublic".
Your best bet is to finish a migration to Windows 10 ASAP, but there are other options in the interim, says content delivery company Kollective.π Read
via "Security on TechRepublic".
TechRepublic
What to do if you're still running Windows 7
Your best bet is to finish a migration to Windows 10 ASAP, but there are other options in the interim, says content delivery company Kollective.
β Microsoft now reviewing Skype audio in βsecureβ places (not China) β
π Read
via "Naked Security".
A former contractor in Beijing: βIt sounds a bit crazy now [...] that they gave me the URL, a username and password sent over email.βπ Read
via "Naked Security".
Sophos News
Naked Security β Sophos News